
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-57791 affects the Linux kernel's SMC (Shared Memory Communication) networking component. The vulnerability was discovered in December 2024 and involves improper validation of message length in the smcclcwait_msg function. This security issue affects various Linux kernel versions and was officially disclosed on January 11, 2025 (NVD).
The vulnerability exists in the net/smc subsystem where the field length in smcclcmsghdr, which indicates the message length to be received from the network, is not properly validated. When the length value exceeds the buflen parameter in the smcclcwaitmsg function, it can result in a deadloop condition while attempting to drain the remaining data. The issue stems from not properly checking the return value of sock_recvmsg when draining CLC (Connection Layer Control) data (Kernel Commit).
The vulnerability could lead to a denial of service condition in the Linux kernel's SMC networking component. When exploited, it can cause the system to enter a deadloop state while processing network messages, potentially affecting system availability and performance (NVD).
The vulnerability has been patched in various Linux kernel versions. The fix involves adding proper validation of the sock_recvmsg return value and implementing error handling when the received data length is less than expected. Fixed versions include Linux 5.10.234-1 and 6.1.128-1~deb11u1 for Debian systems (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."